OneShot-Extended performs the Pixie Dust attack without the requirement of monitor mode.
This is an improved version of the original OneShot
- Highlighting of a vulnerable WPS version (1.0) in the scanner
- Ability to save the AP right into the Network Manager of your system
- Ability to clear the screen every scan
- Minor changes (e.g, WPA3TM indication, better vulnwsc detection, RF-Kill handling)
- Works on modern python versions (>3.8)
- Improved Android support
- Pixie Dust attack
- Offline WPS PIN generating algorithm
- Online WPS bruteforce
- Wi-Fi scanner with highlighting based on iw;
- Ability to write to a file
Required arguments:
-i, --interface INTERFACE : Name of the interface to use
Optional arguments:
-b, --bssid BSSID : BSSID of the target AP
-p, --pin PIN : Use the specified pin (arbitrary string or 4/8 digit pin)
-K, --pixie-dust : Run Pixie Dust attack
-F, --pixie-force : Run Pixiewps with --force option (bruteforce full range)
-B, --bruteforce : Run online bruteforce attack
--pbc, --push-button-connect : Run WPS push button connection
Advanced arguments:
-d, --delay <n> : Set the delay between pin attempts
--vuln-list VULN_LIST : Use custom file with vulnerable devices list
-X, --show-pixie-cmd : Always print Pixiewps command
-w, --write : Write credentials to the file on success
-s, --save : Save the AP to network manager on success
-l, --loop : Run in a loop
-c, --clear : Clear the screen on every wi-fi scan
-r, --reverse-scan : Reverse order of networks in the list of networks. Useful on small displays
--mtk-wifi : Activate MediaTek Wi-Fi interface driver on startup and deactivate it on exit (for internal Wi-Fi adapters implemented in MediaTek SoCs).
: Turn off Wi-Fi in the system settings before using this.
--iface-down : Down network interface when the work is finished
-v, --verbose : Verbose output
-h, --help : show this help message and exit
Please note that root access is required.
Installing requirements
pkg install -y root-repo
pkg install -y git tsu python wpa-supplicant pixiewps iw openssl
Getting OneShot-Extended
cd ~
git clone --depth 1 https://github.com/chickendrop89/OneShot-Extended ose
Running
sudo python ose/ose.py -i wlan0
Install these packages through your distro's package manager:
python3 wpa-supplicant iw wget pixiewps
Getting OneShot
cd ~
git clone --depth 1 https://github.com/chickendrop89/OneShot-Extended ose
Running
sudo python ose/ose.py -i wlan0
This happens because something else is trying to use the interface (Wi-Fi scanner/Network managers)
- Android: try re-running the tool few times
- Linux: try disabling Wi-Fi in the system settings, and kill the Network manager.
- Alternatively: you can try running OneShot-Extended with
--iface-down
argument.
- Try running Oneshot-Extended with the
--mtk-wifi
flag to initialize Wi-Fi device driver.
kimocoder, drygdryg
for the foundation of this projectrofl0r
for original oneshot
Warning
This tool is intended for educational and authorized penetration testing purposes only. It is not designed for, and must not be used for, illegal activities such as hacking, unauthorized access, or causing damage to systems or networks. By using this tool, you agree to use it responsibly and ethically, and to comply with all applicable laws and regulations. The developer assumes no responsibility for any misuse of this tool.